shadsidd / Automated-XSS-Finder
Automated XSS Finder
☆59Updated 11 years ago
Related projects: ⓘ
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆36Updated 4 years ago
- Actarus is a custom tool for bug bounty☆75Updated 4 years ago
- Send notifications if a new program is published on HackerOne using Pushbullet☆25Updated 7 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 3 years ago
- ☆61Updated this week
- Scripts for Deploying new server☆46Updated 6 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 9 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆41Updated 11 years ago
- PHP tool to test XSS☆23Updated 4 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 6 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆102Updated 7 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 6 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 3 years ago
- ☆34Updated 4 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 6 years ago
- This is a Firefox WebExtension that monitors the browsing activity and automatically perform an automated XSS vulnerability scan by submi…☆18Updated 7 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆36Updated 9 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆162Updated 4 years ago
- Various tools for managing bug bounty recon and exploration.☆46Updated last year
- ☆49Updated this week
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 2 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Local File Inclusion Exploitation Tool (mirror)☆121Updated 7 years ago
- Pillage a git repo found in an accessible web root☆59Updated 13 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 2 years ago
- PoC for an adaptive parallelised DNS prober☆107Updated last year
- a collection of payloads for common webapps☆73Updated 11 years ago